Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fr3h-2jww-582m

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

EPSS

Процентиль: 83%
0.02008
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
около 10 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

redhat
больше 10 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

nvd
около 10 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

msrc
10 месяцев назад

Описание отсутствует

debian
около 10 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1. ...

EPSS

Процентиль: 83%
0.02008
Низкий

Дефекты

CWE-200